VYPR
Unrated severityNVD Advisory· Published Jul 3, 2015· Updated May 6, 2026

CVE-2015-3685

CVE-2015-3685

Description

CoreText in Apple iOS before 8.4 and OS X before 10.10.4 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted text file, a different vulnerability than CVE-2015-3686, CVE-2015-3687, CVE-2015-3688, and CVE-2015-3689.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

CoreText in Apple iOS and OS X contains a memory corruption vulnerability triggered by a crafted text file, leading to arbitrary code execution or denial of service.

Vulnerability

CoreText in Apple iOS before 8.4 and OS X before 10.10.4 contains a memory corruption vulnerability that can be triggered by processing a crafted text file. This issue is fixed in iOS 8.4 and OS X Yosemite v10.10.4 [1][2].

Exploitation

An attacker can exploit this vulnerability by delivering a malicious text file to a user and convincing them to open it. No additional privileges are required; the text file is processed by CoreText when displayed or parsed.

Impact

Successful exploitation could allow an attacker to execute arbitrary code in the context of the affected application or cause a denial of service due to memory corruption.

Mitigation

Apple has addressed this vulnerability in iOS 8.4 and OS X Yosemite v10.10.4. Users should update their devices to the latest versions. No workarounds are available.

AI Insight generated on May 23, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

4

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

6

News mentions

0

No linked articles in our index yet.